G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches

G06F12/0888—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using selective caching, e.g. bypass

Abstract

ABSTRACT OF THE DISCLOSURE

A storage hierarchy has a caching buffer and a backing store; the backing store preferably having disk-type data-storage apparatus. A directory indicates data stored in the caching buffer. Upon a data-storage access, read or write, within a series of such accesses, resulting in a cache miss, all subsequent data storage accesses in the series are made to the backing store to the exclusion of the caching buffer even though the caching buffer has storage space allocated for such a data transfer. Selected limits are placed on the series to the backing store, such as receiving on end of series (end of command chain) indication from a using unit, crossing DASD cylinder boundaries, receiving an out of bounds address or receiving certain device oriented commands.

Description

~'7~g MET~OD AND APPARATUS FOR ~YPASSING A CACHE

Field of the Invention The present invention relates to multilevel storage hierarchies, more particularly to the controi thereof with respect to data resident in upper levels of the hierarchies~

Background of__he Invention Peripheral storage hiera.rchies have been used for years for providing an apparent store as suggested by Eden, et al in U. S Patent 3,569,938. Eden, et al teach tha~ in a demand paging or re~uest system, caching data in a cache-type high-speed ront store (buffer) can make a peripheral storage system appear to have a large lS capacity, yet provide rapid access to data; rapid access being faster than that provided to the normal backing store. Eden, et al also teach that the backing store can be a retentive store, such as magnetic taDe recorde-s and magnetic disk recorders while the front store can be a O volatile store such as a magnetic core store. With the advances in data storage technology, the front slore t~pically includes semiconductive type data storage ; TU981021 .~

elements. Patent 3,839,704 shows another for~ of the storage hierarchy. An important aspect of sto-age hierarchies is data integrity. That is, the data received from a user, such as a central processing unit (CPU) or other data handling device, should be returned to the supplying unit either correct or with an indication that errors may exist. It is typlcal practice in storage hierarchles to move data from a higher level to a lower level for such retentive storage as well as limiting the data in the higher levels such tha~ other data can be stored for rapid access. U. S. Patent 4,020,466 shows copying changes from a highlevel store to a backing store, while U. S. Patent 4,077,059 shows îorcing copyback under predetermlned conditions. Such copyback operations can consume storage hierarchy performance time, i.e., so much data may be copied back that access to the data by a using unit may be degraded.This problem is partially soLved by U. S. Patent 3,588,839 which teaches that the only data that need be copied back from a high-level storage unit to a low-level storage is that data that is altered, i.e., where there is noncongruence between data in a backing store and data in a front store.

Storage hierarchies have taken diverse forms. ~or example, in accordance with the Eden, et al patent 3,569,938 a single high-speed store serviced several users. U. S. Patent 3,735,3~0 shows that each processor can have its own high-speed store or cache for different performance reasons. Performance of the storage hierarchies also is affected by the algorit.~ms and other controls used to place predetermined data into the cache or high speed storage portion. Accordingly, U. S.Patent 3,898,624 shows that varying the ~ime of fetching _ _ . . . , _ _ _ _ _ _ _ . . . , _ _ . _ . . , ~B'7~data from a backing store to a front or caching store can be selec~ed by computer operator in accordance w~th ~he programs being executed in a using CPU. In this manner, it is hoped that the data resident in the cache or upper level of the hierarchy will be that data needed by the CPU while excess data not needed is not resident. Thls arrangement allows more useful data to be stored in the higher level storage portion. All of these oper~tions become quite intricate. Accordingly, evaluation programs for storage hierarchies have been used to evaluate how best to manage a storage hierarchy. U. S.Patents 3,964,028 and ~,068,30~ show performance monitoring of storage hierarchies for achieving these goals. Even at that, much remains to ~e done in various types of storage hierarchies for enhancing optimum performance while ensuring data inteqrity. Much of the work with respect to storage hierarchi-s has occurred in the cache and main memory combinations connected to a using CPU. The principles and teachings from a cached main memory relate directly to caching and buffering peripheral systems, as originally suggested by Eden et al, supra. Of course, main memory has been used prior to Eden, et al for buffering or cac~ing data from a magnetic tape and disk unit for a CPU, i.e., a main memory was not only used as a CPU working store but also as a buffer for peripheral devices.

The performance monitoring referred to above has indicated that it is not always in the best interest of total data processing performance and integrity to always use a caching buffer interposed between a using unit and a backlng store. For example, U. S. Pa'ent 4,075,686 teaches ~hat a cache can be turned on and off by special instructions for b~passing the cache.

~ 3~

4 ~ ~'7~

Further, the bac}cing store or memQry was segmented lnto various devices with some of the devices or segments being bypassed, such as for serial or sequential input/output operations. This patent further teachss that for certain commands, it is more desirable to not use cache than to use cache. U. S. Patent 4,268,907 further teaches that for a command specifyin~ the fetching of data words on indicator flag is set to a predetermined state. Such flag conditions replacement circuits to respond to subsequent predeter.nined commands to b~pass cache storage for subsequently fetched data words when the indicator flag is in the predetermined state to prevent replacement of extensive numbers of data instructions already s~ored in cache dur~ng the execution of such instructions. Further patent 4,189,770 shows bypassing cache for operands b~ using cache for instruction.

Disk storage apparatus, alsc referred to as direct access storage devices (DASD), provide larae ~uantitles of ~andom access non volatile storage for data processing. Caching the DASD, as suggested above, provides a storage hierarchy with the performance and throughput capability better than that of DASD; it also reduces the cost of data storage, power req~lirements, and increasing volumetric storage efficiency. Such performance improvement is obtained principally by maximizing the number of data storage accesses which can be satisfied by accessing a copy of the data in the cache rather than by directly accessing the DASD. Management of the storage hierarchy includes dynamically ente~ing data into and deleting data from the cache with tne intent of increasing the proportion of the number of accesses that can be satisfied thrQugh the cache. Some ~ ~'7~commands to DASD require access to the device irrespective of whether or not a cache is present. Such commands include read IPL, write home address, write ROand write COUNT KEY DATA. On DASDs manufactured by S International Business Machines Corporation, Armonk, New York, on such device related commands, the user accesses the DASD, obtains synchronization with the disk rotation (called orientation) and then operates dir~ctly with the DASD. When caching is used, some commands such as SEA~CH, and so forth, that normally require rotational orientation of the DASD record surfaces with respect to the request can be handled by searching the cache and proceeding as if the cache were the DASD, there~y enhancing performance. It should be noted that lS hosts have been programmed to optimlze accesses to D.~SD by constructing programs that accommodate DASD head seeks and latency chaiacteristics. The present invention takes advantage of this fact each time a cache miss occurs. Otherwise, the time required to locate allocation space in cache, particularly where a large multi-megabyte cache is employed, reç,uires sufficient time that in high performance DASDs, orientation may be lost during the search. Therefore, rather than enhancing perfor~ance, performance of the DASD can actually degrade through the addition of a cache. The present invention ensures total performance enhancement. For multitrack commands the chain of commands is sensitive to the current relative position of the read~write mechanism with respect to the records.Sinçe the command must be processed against a so-called home address, record zero or record one of an adjacently addressed or next track where orientatlon sensitivities occur, a penalty in time lost occurs ~hen orientatlon lSlost and is needed. This loss of time is equal to Ihe '7~latency period of the DASD. Therefo-e, in a multi~rac~operation two rotations of the DASD disk could be required under certain operating conditions when cache directories are searched for data images or replications stored in cache.

A so-called S~EK HEAD, i.e., a command which causes the electronic switching between transducers in a multidisk DASD, is also sensitive to the current position of the read/write mechanism with respect to the rotating disk.Present input/output command chains and the data being accessed on the DASD have been structured in a way that depends upon establishing o~ientation with the next access trac~ in the amount of time no greater than some ixed values, that is there is rotational offset of the data on the disk which allows electronic track switching Wi~lOUt LOSS of orientation. This fixed value of elapsed time has been determined from known device characteristics and is usually close to the time required by ~oncache device to perform the switching operation. Because of the operational characteristics of the peripheral system in a multitrac~ operation, such loss of time can be magnified because of other operations being performed requiring repeated attempted accesses in a multitrack operation. Accordingly, it is desired to provide a cached DASD which operates in a manner preventing exposures to loss of orientation while ` maintalning high data integri~y.

Summary of the Invention It is an object of the invention to provide a cached peripheral subsystem in which the interaction of a peripheral device and a caching buffer (cache) is optimized for integrity and per`~orma~ce.

TU~81021 In accordance with the invention, a buîfered peripheral system having a plurality o peripheral devices connected to and sharing a caching data buffer which is accessible via a directory means and which includes indications whether or not cache buffer space is allocated to a given addressable portion of any peripheral device. In a data transfer between the buffered peripheral system and a using unit, the directory means are first examined to ascertain whether or not the caching buffer has space allocated relating to a data transfer just being initiated. If such space is allocated, then the data transfe~ occurs between the data bufer and the using unit. If the data buffe~ has no space allocated, then trans'er is initiated directly with the peripheral device. Following any data transfer which requires access to the device, a series of chained data transfers to such data transfers operates continuously with the peripheral device, even thoush space is allocated in the caching buffer for any data transferred in such subsequent chained data transfers.

In a specific version of the invention, the peripheral device is a disk storage apparatus having addressable cylinders of dataj each cylinder having a set of tracks on respective disk record surfaces. The invention ~5 further includes limiting the chain of data signals to a c~linder; upon accessing a different cylinder, the caching buffer is again accessed to determine whether or not space is allocated.

In a further refinement of the buîfe~ed ?erlpheral system, it is possible to pin data to the cache buffer.In accordance with the invention, followlng completion of any chain of da~a transfers, the cachins bufer is e~amined to see if any clata transfer to a periphe~al device related to any pinned data; upon any coincidence of such data -transfer to a peripheral device, then the updated record on the device is transferred to the caching buffer to ensure congruence between the pinned data in the caching buffer and the data in t~e disk storage apparatus. When the DASD stored data is updated while the corresponding replication of this data stored in cache is not updated, then rather than update _he cache stored, but unbound, data, such cache stored data is invalidated, i.e., efectively erased by removing addressability.

The foregoing and other objects, features, and advantages of the invention will be apparent from the following more particular description of the preferred embodiments of the invention, as illustrated in the ; accompanying drawings.

Figure 2 is a block diagram of a buffered peripheral system employing 'he present invention, as shown in Eigure l.

Figure 3 is a machine operations chart lllustrating the operation of the invention in the Figure 2 illustrated buffered peripheral system.

~ ~ 8'7~Detailed Descri~tion Referrlng now more par-ticularly to the drawing, iike numerals indlcate like parts and structural features in the various diagrams. A using unit 10, such as a central processing unit (CPU or and the like) is connected via a peripheral connection 11 to storage director 12.Storage director 12 includes a programmahle processor for operating storage devices which store data for using unit 10. Storage director 12 in turn is connected via device connection 13 to DASD 14. Data is transferred from DASD 14 through storage director 12 to using unit 10 and in the reverse direction, all in accordance with I/Oof peripheral commands supplied by using unit 10 over input/output connection 11 to storage director 12.lS Storage director 12 decodes the received I/O commar.ds and generates a series of device commands transmitted to DASD 14 over device connection 13 using known procedures~ One or more DASD 14 may be connected to storage director 12.

To enhance operation of the just-described storage system including director 12 and DASD 14, a cache 15 is connected to storage director 12 via memory connection 16. Cache 15 is preferably a high-speed random-access multi-meyabyte storage unit addressable as any _andom access storage unit is addressed. A storage director 12 having independent access to DASD 14 and cache 15 can operate independently with those units. Predetermined data from DAS~ 14 is promoted to cache 15 for acc~ss by using unit 10 in reauced time. In accordance with the invention, operation of the s~orage system including director 12, cache 15 and DASD 14 is enhanced by limited bypassing access to cache 15 upon a cache mlss. ~nenever a given peripheral command requesting data or for supplying data to the system finds that r.o space 1~ cache 15 is allocated for such data, the remainder of the chain of peripheral commands addressing data within a cylinder of DASD 14 is handled directly between using unit 10, storage director 12 and DASD 14. Such bypass occurs even though space may be allocated in cache 15 for data referred to by the peripheral commands. An advantage of this arrangement is that orientation of DASD i4 with respect to operations of using unit 10 is maintained.

A cylinder of data in DASD 14 is defined in accordance with the International Standards Organization as ~ata contained in a set of tracks all residing within the same nominal distance from the rotational axis of a DASD. ACylinder is also defined as all of the record tracks in a disk storage device, such as a DASD, that is accessible without repositioning the DASD 14 transducer access mechanism (not shown, but as described in U. S. Patent 3,503,060); i.e., all of the tracks that can be accessed as a group through electronic switching.

Data integrity requires congruence between data stored in cache 15 and da,ta stored in DASD 14. Storage director 12 includes a 1ag bit or flip-flop 20 indicating for each DASD 14 whether or not access to the data is to be achieved through cache 15 or directly to DASD 14. When bit 20 is set to C, cache 15 is accessed; when bit 20 is set to D, then DASD 14 is accessed. Upon a miss, i.e., data being written to the peripheral s~stem or to be retrieved from the peripheral system is not in cache lS, then storage director 12 supplies a signal over bus 21 setting bit 20 to the D state. Upon certain other con-ditions, as will become apparent, bit 20 is set to the C

state. The memorized state of bit 20 ls supplied to storage director 12 controls via line 22. Accordingly, when using unit 10 requests data from the peripheral system, storage director 12 after decoding the command, examines bit 20 for the addressed DASD 14. Iî the value is C, then a directory, later described, is searched for cache space allocations; if space is allocated in cache 15, the data transfer occurs directly with cache, avoiding accessin~ DASD 14. Cn the other hand, wher.bit ~0 is in the D state, DASD 14 is accessed. The present inverltion relates to certain controls for controlling bit 20 for enhancing data integrity and performance, as will become apparent.

~hen cache lS is being bypassed during a write operation, ~' then there is a possibility that data in DASD 14 is more current or more recent than the data stored in cache 15, i.e., there is no longer congruence between the data in cache 15 and that in 14. To help reduce this problem, during such direct access to DASD 14 storage di-ector 12 2C provides a device access tally 23, a data processing table accessed via bus 24. This table identifies each track updated in DASD 14 in the direct mode, i.e., when bit 2Q is D; and thç fact that a DASD 14 track was updated is noted in device access tally 23. Upon completion of the peripheral chain of commands, a series of commands;the device access tally 23 is accessed via bus 24 and compared with entries of data stored in cache 15 in a later described directory. For all comparisons, i.e., for all tracks changed in DASD la that have space allocated in cache 15, are then handled in accordance with one aspect of the invention. For tracks or records bound to cache 15 that were altered in DASD la, a replication of the data stored in DASD 14 is moved to cache 15, i.e., is promoted to cache 15; for all t~acks or records that are not bound but modified on DASD 14, are erased from cache 15 by destroying addressability, i.e., the entry for such cached data in the la~er described directory is erased.

The machine operations chart for lmplementing ~he invention in the illustrated system through a programmed processor, which typically includes a control store, includes starting a data storage access by receiving a command from using unit 10. Following decoding the command as at 30, certain preparatory commands are received at 31 for priming the peripheral sys~em to receive data transfer commands. In the illustrated storage apparatus these preparatory commands include a SEEK command which causes the access transducer mechanism to move to an addressed track and commands to select an addressed DASD 14. Following such known preparatory steps, loop 32 of data processing operations is performed. The first step in loop 32 is to receive peripheral commands at 33 or commanding a DASD search followed by either a read R or a write W data transfer operation. At 34, storage director 12 examines bit 20 to see whether or not cache 15 or the addressed DAS3 14 is to be accessed. Normally, for perormance reasons, cache 15 is desired to be accessed; then logic path 35 is followed to step 36 which examines the later described directory to determine if space is allocated in cache 15 for the data in the commanded transfer. Assuming that such space is allocated, a so-called "hit" occurs. Then at 37, cache 15 is accessed and the data processing operation ensues. Upon completion of that operatlon, storage director 12 at 38 examines system status to determine if there has been a change in operations. A

... ..

13 ~ 7~

change can be indicated by the end of chain signal as commonly used on computers manufactured by International Business Machines Corporation. Such end of chain is indicated by removing a so-called SUPPRESS OUT tag signal when another tag signaL "SERVICE OUT" is active at final status in time, i.e., upon completion of command execution. Another change in operation which includes a S~EK command, i.e., a commanded movement of ~he transducer access mechanism; an end of cylinder indication which also requires a movement of the transducer access mechanism; and the like indicates a change of accessing from electronic switching between transducers to a mechanical motion of the access mechanism. With addrsssing tracks in the cylinder and within a chain of command, no change of operation requiring access mechanism motion occurs. Then peripheral system receives an additional read/write command as indicated at 33 for repeating the loop 32 of operations. A plurality of such commands can be executed directly with cache 15 for either reading or writing.

DASD 14 is only accessed when bit 20 is set to the D state as sensed at 34 or a cache miss occurs at 36, i.e., no space is allocated in cache 15. In that event, storage director 12 follows logic path 40 to access DASD 14 at 41. This access, of course, includes transferring data either to DASD 14 or to using unit 10 Upon completion of the access for a write operation, i,e., t-ansfer of data to DASD 14, at 42 the storage dlrector 12 updates device access tally 23 for use upon detection of a change at 38;for a read operation no action occurs, but as an alternate embodiment read accesses can be ~allied eithe-separately or with the write tally to achieve the pu~pose of Ihe present invention. Upon detection of a change at ~7~38, storage director 12 at 43 përforms a congruence check and col~trol, as laler detailed. Such congruence chec~compares the device access tally 23 with a later described directory for cache 15 for determining any S writes to DASD 14 that create noncongruence. Upon completion of this later described operation, storage director 12 at 44 returns to receive additional peripheral commands which may be within the same chain of commands or be a separate chain of commands.

Figure 2 illustrates a preferred e.~bodiment of the invention as employed in a two storage director 12 arrangement. Each storage director 12 includes a plurality of 50 called channel adaptors 50, als~separately denominated as CAA through C~ which connect the respective storage directors 12 to a plurality of using units 10 via a plurality of inpwt/output con~ections 11. Each storage director 12 includes a programmed processor 51 which as usual includes a processing unit (not shown) having a control store (no' shown) which contains computer programs ~or performing the storage director functions. The programmed processor lncludes programs constituting address and command evaluator ACE 52 which receive and evaluate peripheral commands. Such functions are also performed in present day storage directors ~or noncached DASD as widely sold throughout the world. The programmed processor 51 also includes direct access control 53 which responds to commands evaluated and decoded by ACE52 to control data transfers between using units lO and addressed ones of DASD 14, as well as providing device commands to ~ASD 14 for perîorming well kr.own DASD access and control functions. Program ~rocessor 51 further includes CAC 54 which is a cache access control for accessing cache 15. C~ bits 20 for each of the 3ASDs 14 are accessed by DAC 53 and CAC 54 respectively for determining whether to access cache or DASD and ~or setting the bits to D at a cache miss. Connections ~om storage director 12 to DASD 14 are via DASD circuits 55 which are constructed using known device adaptor and data flow design technioues. Cache 15 is accessed ~ia memory circuits 56 which includes those circuits for generating addresses and access requests. Cache 15 is a portion of a large random access store 57, hereinafter re~erred to as a system store. A directory 58 ~or cache 15 is also stored in system store 57. The directory 58 is accessed using known hashing techniques based upon the address structure of DASD 14. Each unit of data, track or record stored in cache lS has an entry in directory 58, as is known in the data processing art.Additionally, usin~ unit 10 can command the storage directors 12 to keep data in cache, i.e., pin or bind t~e data to cache 15. For all bound tracks and records a cache bound list 60, stored within directory 58 but shown separately for clarity, indicates to both storage directors 12 which data stored in cache !5 is to remain in cache 15. This bound list is used in the congruence check and control step 43, as detailed later with respect to Figure 3. Each storage director 12 has its own device access tally 23.

Access to DASD's 14 is via a so-called string arran~ement in which a plurality of DASDs 14 are connected to the storage directors 12 via controllers 65, separately denominated as DCA through DCD. Each storage director 12 connects to the controllers 65 via a daisy-chain device connection 13. A radial connection of known design may also be employed. The operation oî the Figure 2 ~ i ~ 16 ~ ~'7~illustrated system in accordance with the invention is best understood by referring to Figure 3, a machlne operations chart.

Programmed control 51 at 70 receives a storage access request. This request is decoded and evaluated in ACE 52 using known techniques. At 71, programmed processor 51 DAC 53 portion examines CD bit 20 to determine whe-ther cache 15 or DASD 1~ is to be accessed. For a cache Caccess program processor 51 searches directory 58 at 72 to see if the track or record requested in the received I/0 command is stored in cache 15. Searching directories for determining contents of cache or other memories is well known and not detailed for that reason. Ir this regard it is noted that some commands will require a direct connection to DASD 14. Accordingly, ACE 52 in detecting such a peripheral command willset bit 20 or the addressed device to the direct mode. An example of such a peripheral command is to recalibrate DASD 14.Searches and SEARCH ID EQUAL commands can be performed or cache within directory 72, i.e., the co.~mands are performed in a virtual manner not involving DASD 14. In the constructed embodiment dlrectory 58 did not separately identify records in a track; only tracks were identified, no limitation thereto intended. Upon completion of the directory search, programmed processor 51 at 73 determines whether or not a hit has occurred. If a hit has occurred, which is preferred for performance reasons, programmed processor 51 follows logic path 75 to access cache 74 for transferring data between uslng unit 10 and cache 15 using known data trans~er techniques. Upon completion of that transfer, programmed processor 51 returns through logic pa~h 85 for receiving a next peripheral command using Xnown ~817~technlques. Then a second stora~e access reauest is received at 70 for repeating the above described operation for cache 15 accessing.

When a cache miss occurs at 73, the direct mode of data transfer is set at 76. This means that using unit lO will transfer data directly with ~ASD 14 within the cylinder of tracks and for the continuation of the particular chain of commands independent of whe-ther or not space is allocated in cache 15 for any of the data transfers.Once bit 20 for the addressed device is set to the direct state, any subsequently received commands following step 70 will follow logic path 77 to join the exit o step 76 for accessirg DASD 14 and ~allying the access for write commands at 78 (no tallying for read commands, no limitation thereto intended): Accessing DASD 14 for data transfers, then updating ~ least recently used linked list for cache replacement control, is well known and not detailed for that reason. The address of ~he track/record to be written for the addressed DASD 14 for each write is stored in device access tally 23 for later described postchain/postcylinder operations. Upon completion of the command execution by executing step 78, programmQd pr,ocessor 51 reports final status at 79 to using unit 10.

Upon posting final status, progral~med processor 51 then determines whether or not there is a change in operations as detected at step 38 of Figure 1 and as detected within a series of branch operations 80 of Figure 3. These checks may be perforrned upon sending final sta~us ~o using unit 10 or upon receiving a next ?eripher^al co~mand but beore execution of such next periphe~al command. Afirst check at 81 chec'.~s for end of the chain ~ECCH) .

1 ~'~

~3'7~`'3~whlch is detected by the absence of the SUPPR~SS OUT tag signal at final status time. The second check at 8, is for the end of the cylinder (EOCYL), that is all oî the set o tracks withir a cylinder have a predetermined address space, tracks 1 through 17, for example.~epending upon the addressing increment direction, i.e., increasing or decreasing track addresses, upon completion of an access to a track at 78, ~he next ~rack can be in an adjacent cylinder or within the cylinder. If the next track to be accessed is e~pecte~ to be ln an adjacent cylinder, then at 82 programmed processor 51 indicates end of cylinder, a change indlcated in step 38.The third check at 83 is for out of bounds (003). It is common practice in present day DASD peripheral systems to have a defined extent command received from a using unit 10. A defineextent command establishes a range of addresses which defines bounds of permitted access.Accordingly, if programmed processor 51 in processing the peripheral command at 78 indicates that the address being processed is at the boundary of the defined extent;then an out of ~ounds condition occurs, i.e., the next desired access will be outside of the previously defined extent, i.e., a change in operation. A fourth checX at 84 is for a received command decoded by step 70 which is a device related command. This type of co~and includes the R~CALIBRATE command as used on present day DASD.

If all of the steps 81-84 indicates no such change, then programmed processor 51 follows path 85 to receive the next peripheral command. If any one of the conditions set forth for steps 81-84 ar~ met, then programmed processor 51 follows logic path 90 to reset bit 20 to the C state at step 91. Then at 92 program processor 51 in step 93 scans cache bound list 60 and compares each entry ~U981021 9~3 in cache bound list with the contents of device access tally 42. For each hit, i.e., favorable comparisons, programmed processor 51 actuates the peripheral system to transfer data ~rom DASD 1~ to cache 15 corresponding to that data, i.e., a track on DASD 14 was changed when data contained in cache 15 was bound to that cache. For congruence and data integrity cache 15 is updated. At completion of the scan OI no hit, step 94 is omitted. At 95, the tracks on DASD 14 which were modified and not 1~ bound to cache 15 are demoted from cache 15. At 96, programmed processor 51 examines a sequential bit (not shown) to see whether or not a using unit 10 had indicated that the ~revious storage requests were indicated as being sequential data, i.e., the using unit 10 is using the data in the batch mode such that sequential processing occurs as opposed to interactlve modes where partitioned data sets or random accesses to the data occur. If the data is not sequential, then programmed processor 51 goes to logic path 85. For sequential data programmed processor 51 at 97 promotes the entire contents of the last track accessed in the DASD 14 to cache 15. This occurs for read operations.For purposes of brevity the sequential indica~or is not shown in the drawing, but it is a bit in control store of programmed processor 51 for each of the addressed DASD14.

In the above described operation, ac-essing DASD 1 ensures recording data from using unit 10 into the retentive store of DASD 14 as quickly as possible thereby avoiding transferring the data to cache and then from cache to DASD 14 whenever orientation of .he DASD l has been established and whenever allocation is -equi.ed in cache 15. Practi_ing t~is invent~on in a test 19 ~

7~environment has shown that this has protected data integrity ~hile enhancing performance of the peri~heral storage system.

While the invention has been particularly shown and described with reference to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention.

~ 1~ !

Claims (21)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:

1. The method of operating a buffered peripheral system having a plurality of peripheral devices connected to and sharing a random-access data buffer, directory means for indicating whether data storable in a one of said peripheral devices has data storage space allocated therefor in said data buffer, data transfer means connected to said data buffer and to said peripheral devices for transferring data therewith and with external means external to said buffered peripheral system;the improvement including the steps of:initiating a data transfer for transferring a record of data, by addressing a given one of said peripheral devices, between said buffered peripheral system and said data transfer means by first examining said directory means to ascertain whether said data buffer has data storage space allocated relating to said data transfer being initiated, if said data storage space is allocated, performing said data transfer between said buffer and said data transfer means;if said data buffer has no data storage space allocated for said data transfer, bypassing said data buffer and directly transferring data with said given one peripheral device; and then transferring in a respective series of data transfers a series of records of data between said data transfer means and said give one of said peripheral devices without examining said directory means such that said series of data transfers occurs with said given one of said peripheral devices irrespective of said data storage space allocations in said data buffer.

2. The method set forth in Claim 1 further including the steps of:

detecting an access delay boundary in said given peripheral device intermediate two successive ones of said data transfers in said series of data transfers, then examining said directory means for space allocation relating to a next successive one of said data transfers following said access delay boundary and then repeating the steps set forth in Claim 1.

3. The method set forth in Claim 1 further including the steps of:completing said series of data transfers and indi-cating all write operations that modified data stored in said peripheral devices; and invalidating corresponding but unmodified data stored in said data buffer.

4. The method set forth in Claim 2 further including the steps of:completing said series of data transfers and indi-cating all write operations that modified data stored in said peripheral devices; and invalidating corresponding but unmodified data stored in said data buffer.

5. The method set forth in Claim 1 further including continuing said series of data transfers directly with said given one peripheral device until said external means sends a device-related peripheral command, then on any subsequent data transfer reexamining said directory means for storage space allocated in said data buffer.

6. The method set forth in Claim 1 wherein said peripheral devices are disk data-storage apparatus each of which have a plurality of record surfaces with radially movable transducer means with all axially aligned record tracks in said surfaces being a cylinder of such tracks;further including the steps of:continuing said series of data transfers directly with said given one peripheral device within a first cylinder of said record tracks; and upon accessing a second cylinder of said record tracks reexamining said directory means for storage space allocated in said data buffer.

7. The method set forth in Claim 1 further including the steps of:continuing said series of data transfers directly with said given one peripheral device, receiving an indication from said external means that said series is complete; and upon any next data storage access to said given one peripheral device reexamining said directory means for space allocated in said data buffer.

8. The method set forth in Claim 1 further including the steps of:establishing a range of addresses in said given one peripheral device;receiving a data storage address from said external means indicating a record storage area in said given one peripheral device to be accessed for each data transfer in said series of data transfers; and continuing said series of data transfers directly with said given one peripheral device until a received one of said received data storage addresses is outside said range of addresses; then reexamining said directory means for storage space allocated in said data buffer.

9. The method set forth in Claims 1, 2 or 5 including the steps of:receiving read requests from said external means for data transfers from said given one peripheral device to said external means; and initiating said data transfer and transferring said series of data signals to transfer data signals from said given one peripheral device to said external means.

10. The method set forth in Claims 6, 7, or 8 including the steps of:receiving read requests from said external means for data transfers from said given one peripheral device to said external means; and initiating said data transfer and transferring said series of data signals to transfer data signals from said given one peripheral device to said external means.

11. The method set forth in Claims 1, 2 or 5 including the steps of:receiving write requests from said external means for data transfer to said given one peripheral device from said external means; and initiating said data transfer and transferring said series of data signals to transfer data signals to said given one peripheral device from said external means.

12. The method set forth in Claims 6, 7 or 8 including the steps of:receiving write requests from said external means for data transfer to said given one peripheral device from said external means; and initiating said data transfer and transferring said series of data signals to transfer data signals to said given one peripheral device from said external means.

13. The method set forth in claims 1, 2 or 5 including:receiving write requests from said external means for data transfer to said given on peripheral device from said external means; and initiating said data transfer and transferring said series of data signals to transfer data signals to said given one peripheral device from said external means;receiving from said external means an indication that predetermined data stored in said data buffer is bound to said data buffer;completing said series of write data transfers, for each write data transfer in said series of data transfers made directly to said given one peripheral device that is to a data storage area in said given one peripheral device containing data not bound to said data buffer remove corresponding data from said data buffer and if to a data storage area in said given one perceptual device containing data indicated as bound to said data buffer, and transferring all such written data from said given one peripheral device to said data buffer for updating the found data stored therein.

14. The method set forth in claims 6, 7 or 8 including:receiving write requests from said external means for data transfer to said given one peripheral device from said external means; and initiating said data transfer and transferring said series of data signals to transfer data signals to said given one peripheral device from said external means;receiving from said external means an indication that predetermined data stored in said data buffer is bound to said data buffer;completing said series of write data transfers, for each write data transfer in said series of data transfers made directly to said given one peripheral device that is to a data storage area in said given one peripheral device containing data not bound to said data buffer remove corresponding data from said data buffer and if to a data storage area in said given one perceptual device containing data indicated as bound to said data buffer, and transferring all such written data from said given one peripheral device to said data buffer for updating the found data stored therein.

15. The method set forth in claims 1, 2 or 5 further including the steps of:receiving write requests from said external means for data transfer to said given one peripheral device from said external means; and initiating said data transfer and transferring said series of data signals to transfer data signals to said given one peripheral device from said external means;receiving from said external means an indication that predetermined data stored in said data buffer is bound to said data buffer;completing said series of write data transfers, for each write data transfer in said series of data transfers made directly to said given one peripheral device that is to a data storage area in said given one peripheral device containing data not bound to said data buffer remove corresponding data from said data buffer and if to a data storage area in said given one perceptual device containing data indicated as bound to said data buffer, and transferring all such written data from said given one peripheral device to said data buffer for updating the found data stored therein;receiving an indication from said external means that requested data is being transferred in said series of data transfers; and upon completing said series of data transfers, transferring the data signal contents of the last data storage area in said given one peripheral device which received data signals in said series of data transfers.

16. The method set forth in claims 6, 7 or 8 further including the steps of:receiving write requests from said external means for data transfer to said given one peripheral device from said external means; and initiating said data transfer and transferring said series of data signals to transfer data signals to said given one peripheral device from said external means;receiving from said external means an indication that predetermined data stored in said data buffer is bound to said data buffer;completing said series of write data transfers, for each write data transfer in said series of data transfers made directly to said given one peripheral device that is to a data storage area in said given one peripheral device containing data not bound to said data buffer remove corresponding data from said data buffer and if to a data storage area in said given one perceptual device containing data indicated as bound to said data buffer, and transferring all such written data from said given one peripheral device to said data buffer for updating the found data stored therein;receiving an indication from said external means that requested data is being transferred in said series of data transfers; and upon completing said series of data transfers, transferring the data signal contents of the last data storage area in said given one peripheral device which received data signals in said series of data transfers.

17. The method of operating a data storage hierarchy having a backing store and a caching buffer store with means to store data in said buffer store based upon addressable data storage areas of said backing store, both of said stores having a plurality of addressable data storage areas;including the steps of:in a series of data transfers, wherein each of said data transfers transferring a record of data, transferring data from an external means to said backing store to the exclusion of said buffer store said external means being external to said data storage hierarchy and connected to said backing and buffer stores and to said means to store;upon completion of said series of data transfers determining whether said buffer store is storing data corresponding to data stored in said backing store during said series of data transfers; and effectively removing said corresponding data from said buffer store.

18. The method set forth in claim 17 further including the steps of:receiving an indication from said external means that predetermined data stored in said data buffer is bound to said data buffer; and when said corresponding data stored in said data buffer includes predetermined data, updating said predetermined data which is in said corresponding data by transferring data stored in said backing store of said predetermined data received from said external means and associatable with said predetermined data included stored in said data buffer in said series of data transfers to said data buffer for replacing said predetermined data included in said corresponding data.

19. The method set forth in claim 17 or 18 further including the steps of:receiving from said external means an indication that data transferred in said series of data is sequential data;and upon completion of said series of data transfers, transferring the data contents of the last data storage area in said given one peripheral device which received data during said series of data transfers to said buffer store.

20. In a buffered peripheral system having a plurality of addressable peripheral devices connected to and sharing a random-access data buffer having a plurality of addressable and allocatable data storage spaces and being connectable to an external means for transferring data between said external means and said peripheral devices, directory means operatively connected to said data buffer for indicating whether data storable in a one of said peripheral devices has space allocated in said data buffer;the improvement including the steps of, in combination:initiating a data transfer of a record of data between said buffered peripheral system and said external means by first examining said directory means to ascertain whether said data buffer has any of said data storage space allocated relating to said data transfer being initiated, if said data storage space is allocated, performing said data transfer between said data buffer and said external means;if said data buffer has no data storage space allocated for said data transfer, bypassing said data buffer to transfer data between a one of said peripheral devices and said external means;then transferring a series of records of data in a series of said data transfers with said peripheral devices external means without examining said directory means such that said series of data transfers occur with said peripheral devices irrespective of said space allocations in said data buffer; and detecting an access boundary in said one of said peripheral devices intermediate two successive ones of said data transfers in said series of data transfers, then examining said directory means for space allocation relating to a next successive one of said data transfers following said access boundary.

21. In a data storage hierarchy adapted to be connected to using units, comprising:a cache store for addressably storing data;a backing store for addressably storing data in respective addessable data storage areas, and connected to said cache store and means for transferring data between the backing store and said cache store;switching means for selectively switching communication paths between said using units, said backing store, and said cache;transfer means for transferring data between said using units and either said cache store ox said backing store in a series of data transfers, each data transfer transferring a record of data;directory means for addressably indicating data stored in said cache store as it relates to addressable data storage areas of said backing store;device access tally means being responsive to transfer of data between said backing store and said using units to memorize addresses of data stored in said backing store received as changed data from a using unit but not stored in said cache store; and congruence means responsive to a completion of said series of data transfers to examine said directory means and said access tally means to identify changes data content in said backing store not occurring in data stored in said cache store corresponding to said changed data content and including first means for deleting first predetermined portions of said corresponding data stored in said cache store, second means for updating second predetermined portions of said corresponding data stored in said cache store by activating said switching means for transferring said data stored in said backing store associatable by addresses of said backing store with said second predetermined portions of said corresponding data stored in said cache store.

CA000411849A1981-10-151982-09-21Method and apparatus for bypassing a cache
ExpiredCA1187199A
(en)